Motivation and transfer in professional training: A meta-analysis of the moderating effects of knowledge type, instruction, and assessment conditions

A Gegenfurtner - Educational research review, 2011 - Elsevier
This meta-analysis (148 studies, k= 197, N= 31,718) examined the relationship between
motivation and transfer in professional training. For this purpose, motivation was …

Effects of computer support, collaboration, and time lag on performance self-efficacy and transfer of training: A longitudinal meta-analysis

A Gegenfurtner, K Veermans, M Vauras - Educational Research Review, 2013 - Elsevier
This meta-analysis (29 studies, k= 33, N= 4158) examined the longitudinal development of
the relationship between performance self-efficacy and transfer before and after training. A …

Advanced social engineering attacks

K Krombholz, H Hobel, M Huber, E Weippl - Journal of Information Security …, 2015 - Elsevier
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …

Does training improve the detection of deception? A meta-analysis

V Hauch, SL Sporer, SW Michael… - Communication …, 2016 - journals.sagepub.com
This meta-analysis examined whether training improves detection of deception. Overall, 30
studies (22 published and 8 unpublished; control-group design) resulted in a small to …

Towards automating social engineering using social networking sites

M Huber, S Kowalski, M Nohlberg… - 2009 International …, 2009 - ieeexplore.ieee.org
A growing number of people use social networking sites to foster social relationships among
each other. While the advantages of the provided services are obvious, drawbacks on a …

The dark side of social networking sites: Understanding phishing risks

M Silic, A Back - Computers in Human Behavior, 2016 - Elsevier
Abstract LinkedIn, with over 1.5 million Groups, has become a popular place for business
employees to create private groups to exchange information and communicate. Recent …

Effectiveness of deception detection training: A meta-analysis

JE Driskell - Psychology, Crime & Law, 2012 - Taylor & Francis
A meta-analysis was conducted to determine the overall effectiveness of deception detection
training and to identify conditions that may moderate training effectiveness. The analysis …

Social engineering attacks on the knowledge worker

K Krombholz, H Hobel, M Huber, E Weippl - Proceedings of the 6th …, 2013 - dl.acm.org
Social engineering has become an emerging threat in virtual communities and is an
effective means to attack information systems. Today's knowledge workers make use of a …

Social engineering in social networking sites: Affect-based model

A Algarni, Y Xu, T Chan, YC Tian - 8th International Conference …, 2013 - ieeexplore.ieee.org
While social engineering represents a real and ominous threat to many organizations,
companies, governments, and individuals, social networking sites (SNSs) have been …

Securing information assets: understanding, measuring and protecting against social engineering attacks

M Nohlberg - 2008 - diva-portal.org
Social engineering denotes, within the realm of security, a type of attack against the human
element during which the assailant induces the victim to release information or perform …